Abstract

Traditionally security protocol analysis relies on a single Dolev-Yao attacker. This type of attacker is so powerful that overall attack power does not change if additional attackers cooperate. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. We show how non-collaboration between attackers gives rise to interference between ongoing attacks and that it is possible to actively exploit attack interference to mitigate security breaches and provide partial protection to weak protocols.